• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:Anomaly

Anomaly Detection In Cybersecurity For Dummies [E-book]

Log360 | March 3, 2022

Anomaly Detection In Cybersecurity For Dummies [E-book]

If you are a cybersecurity professional, you must be aware that cyberattacks, especially...

Zooming in on UEBA: Answering the "what" and the "how" 

Log360 | August 12, 2019

Zooming in on UEBA: Answering the "what" and the "how" 

What is UEBA? User and entity behavior analytics (UEBA) is a relatively new category of...

Monitoring users for unusual file activity

Identity and access management | December 19, 2018

Monitoring users for unusual file activity

As we discussed in a previous blog, the user behavior analytics (UBA) engine of ADAudit...

Identity and access management | December 6, 2018

Leveraging logic and AI to detect malicious behavior in Active Directory [Webinar]

Active Directory is still vital for every organization that's staying on-premises or...

NetFlow Analyzer | April 21, 2011

Understanding TCP-based anomalies using NetFlow Analyzer

In our previous blog, post we discussed the problems classified by the Advanced Security...

NetFlow Analyzer | March 24, 2011

Detecting Suspicious Flows using NetFlow Analyzer

Network security has always been the top priority of Network administrators all over the...